Voronoi-based image representation applied to binary visual cryptography
TLDR
The proposed Voronoi-based Visual Cryptography (VVC) technique permits to drastically reduce the amount of encoded and transmitted information by comparison with a traditional VC scheme.Abstract:
A common processing scheme of Visual Cryptography (VC) consists of generating two ciphered images from a secret image. The sender transmits these key images via two different channels. The receiver collects the key images and recovers the secret image by superimposing them. In this article, Voronoi tessellation is exploited in Visual Cryptography for the first time to the best of our knowledge. The proposed Voronoi-based Visual Cryptography (VVC) technique permits to drastically reduce the amount of encoded and transmitted information by comparison with a traditional VC scheme. Hence, the technique can be used for transmissions of secret images with enforcement of the transmission reliability by enhancing the redundancy of information or with communication networks and technologies having low bandwidth and memory. Moreover, the random arrangement of the Voronoi polygons makes the transmission of the secret image more secure since the sender and the recipient use a private generator of random points. In addition, shape reconstruction properties of the image-based Voronoi representation are stated.read more
Citations
More filters
Journal ArticleDOI
Voronoi cell analysis: The shapes of particle systems
TL;DR: Voronoi tessellations, originally introduced to study problems in pure mathematics, have become a powerful and versatile tool for analyzing various problems in physics as mentioned in this paper , and can be used to characterize many physical systems.
Journal ArticleDOI
The Methodology of Creating Variable Resolution Maps Based on the Example of Passability Maps
TL;DR: The conducted research demonstrated that variable resolution passability maps may successfully replace maps that consist of sometimes several dozen times higher numbers of primary fields, which enables reducing the amount of data stored in computer memory and shortens the time necessary to access visualization and information analysis onpassability maps.
Journal ArticleDOI
Secure Online Voting System using Visual Cryptography
TL;DR: In this paper, a secure online voting system using visual cryptography is proposed, where visual information can be encrypted on the user side, with the information decrypted on the admin side, which can be helpful in allowing participation in voting systems securely and ensuring fast vote counting and monitoring of the voting process.
Journal ArticleDOI
Multiple color image encryption based on cascaded quaternion gyrator transforms
TL;DR: Wang et al. as mentioned in this paper proposed a novel encryption algorithm using cascaded quaternion gyrator transforms that allows protecting multiple color images with efficiency at once. But the originality is reflected in the integration of quaternions algebra with a cascaded encryption structure.
Proceedings ArticleDOI
Design and Implementation of Lightweight Manmachine Terminal Screen Interactive Client
TL;DR: In this article, a lightweight human-machine terminal display architecture is proposed to realize the display of electrical primitives, chart primitives and non-viewable primitives on lightweight man-machine terminals.
References
More filters
Journal ArticleDOI
Distance transformations in digital images
TL;DR: Six different distance transformations, both old and new, are used for a few different applications, which show both that the choice of distance transformation is important, and that any of the six transformations may be the right choice.
Visual Cryptography
Moni Naor,Adi Shamir +1 more
TL;DR: In this paper, a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations, is proposed, which is called k-out-of-n secret sharing.
Journal ArticleDOI
Secret image sharing
Chih-Ching Thien,Ja-Chen Lin +1 more
TL;DR: A method such that a secret image is shared by n shadow images, and any r shadow images of them can be used to restore the whole secret image, and the size of each shadow image is smaller than the secret image in this method.
Journal ArticleDOI
Visual cryptography for color images
TL;DR: Three methods for visual cryptography of gray-level and color images based on past studies in black-and-white visual cryptography, the halftone technology, and the color decomposition method are proposed.
Journal ArticleDOI
Extended capabilities for visual cryptography
TL;DR: An extended visual cryptography scheme, for an access structure (ΓQual,ΓForb) on a set of n participants, is a technique to encode n images in such a way that when the authors stack together the transparencies associated to participants in any set X∈�Qual they get the secret message with no trace of the original images, but any X∈Γ forb has no information on the shared image.
Related Papers (5)
Achieving Optimal Contrast in Visual Cryptography Schemes without Pixel Expansion
Thomas Monoth,Babu Anto P +1 more
An Extended Visual Cryptography Algorithm for General Access Structures
Kai-Hui Lee,Pei-Ling Chiu +1 more